ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DC0E13D532F6
|
Infrastructure Scan
ADDRESS: 0xffaa58c82dd3531eeec05d045ac21329728ed66f
DEPLOYED: 2026-04-30 16:06:11
LAST_TX: 2026-04-30 17:04:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-6. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 64 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 2 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x7b812bf2… [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4f10257c3c045412950087f77b8256319a8bcbfd 0x55bc1d3ec412e9a5786363f207c5669c75a2f89a 0x8c97ddf0499f44cbf36c27f9c320acae37db59e5 0xe1b25c32d1f888cdbabb71cde3c465b479e5556f 0x88bb9fa7aba5f8b14b4942f0b5b7c24fde848783 0x20ee36e6c8a94a59f0ec229edb965695dcb5df1e 0x81b27e55c895c30a821413f83a855aaa2d57d9d9 0x8f3af2ca8a1ecc11b3bf9542c6fc7d6b5282e062 0x13aa2606cfb235ca0d2e0d4d9beaaa30b0376036 0x9df39706b171c190919ebae031a8d7021d6c53f7 0xe78bc48319e7a7e6fd087f1ceb22fef59ecf9e39 0x04fa0d991672ef728f11f8acb7842281f421bd68 0x438a27c59b5dcab3f9c64bd073178914b0f4f4bd 0xa2f1d3af42407d2be8550257a07e451623191da8 0x29f8dbdcfd774abf4fd07e6396e8f3ee2915b3b4 0xc0f7ce9b74a27bd5937211a1478e84bc090132f4 0x0846f98fbfac520b4a1c83847a574ed8d7dfa0da 0x4c8f3c90d5989f313037e0c628bd51e99495b76b 0xd6f8b75dc7546dc47c43421c089075f69dc1fa4b 0x205cbd3996c140ac64f15f94317a28b899b85444
